Learning Partner Insights Security & Privacy

Educating IT Security Soldiers for a Virtual Cold War

On a new global battlefield, countries, criminals, and commercial competitors can effectively leverage technology to steal from or attack target organizations. Corporate intellectual property is at risk of breach as most everyone seeks to gain advantage in the innovation race. Military and government information faces the same risks with consequences for national security, digitized assets, and international affairs. The most dangerous hackers are no longer solitary, discontented teenagers working from their basement bedrooms, but instead are highly skilled professionals employed by corporate offices or military bases.   More

Security & Privacy

Social Media’s New Role as a Tool for War

We know the world is awash with new connections and that social media is transforming our social and political landscape. But did you ever think that the CIA may have ways to use social, Skype, and email accounts of officers of unfriendly governments to deliver personal messages and attempt both to track and influence them? This Daily Beast article by Eli Lake explains how the scramble to prevent Syria from using chemical weapons has led to some cutting-edge techniques for intelligence and influence.   More

Bio & Life Sciences Security & Privacy

Black Box for DNA Analysis Keeps Data Off the Cloud

Despite the widely hailed plummeting price and time to get a whole-human-genome sequence, it still takes a battery of software applications and a dream team of specialists to analyze, interpret, and apply DNA data in a medically useful way. A new piece of hardware described in The New York Times this weekend is positioned to substitute for at least a few players on the team.   More

Security & Privacy Techonomy Events

Are Recent Network Attacks as Serious as Washington Says?

Some members of Congress and the White House want to mandate certain “cybersecurity practices” because they believe private sector companies are not doing enough to protect systems. Push-back from business stalled the legislation before the recent election. Now, a series of high-profile attacks is being used to bolster the argument that the U.S. government needs more authority over private sector systems as well as access to data that might indicate incursions.   More

Government Manufacturing Security & Privacy

A Gun Made from a 3D Printer? Techno-Challenges Grow More Complex

At Techonomy we believe that just about literally everything is being transformed by technology, especially Internet technology, and we also are quite psyched about 3D printing. It's another example of the empowerment of individuals—in the potent tradition of the PC, Web browser, Facebook, etc. But now guns are beginning to be made with 3D printers. There is likely nothing that can be done to stop that. It underscores another fundamental Techonomy point—that all of us, as citizens, leaders, and human beings—need to be thinking harder about what technology is doing to the world in which we live. Disruption is right.   More

Security & Privacy

Technology Helps Germany Reconstruct Its Painful History

The Stasi, the police arm of the East German government that crumbled in 1989 with the fall of the Berlin Wall, attempted to destroy millions of documents chronicling decades of spying on its own citizens. While many of the files are unrecoverable, Germans still want to know as much as much as they can about what they contained—over 70,000 have applied for access to the Stasi archives, prompting an effort to reconstruct shredded files. As reported by NPR's Philip Reeves, the German government is using technology to piece together the remnants, many of which were torn by hand in the last panicked days of the East German regime.   More

Government Security & Privacy

Obama Campaign Uses Big Data to Target Voters Block by Block

As reported by Richard McGregor in the Financial Times, one voter whose name, age, and address were published in the "Obama for America" app, which helps canvassers target doors to knock on, was decidedly nonplussed about having his personal information downloadable by anyone with a smartphone. "Everything is an invasion of privacy these days," he said. "If I got excited about it, I would have had a coronary by now." Others are less sanguine about the ways the Obama campaign is using technology, and data culled from social media, to micro-target voters. But both campaigns have tools that tell them a lot more about voters than their ages and addresses, and they're using them to "slice and dice" the voting population in a way Barack Obama could have never envisioned when he gave his seminal 2004 convention speech.   More

Security & Privacy Techonomy Events

Autonomy CEO Mike Lynch on Transparency and Privacy

In this session from Techonomy 2011, in Tuscon, Ariz., Techonomy's David Kirkpatrick talks to Mike Lynch, CEO of Autonomy, about how technology is changing the realms of transparency and privacy. Lynch claims that evolving technology will make it nearly impossible for anyone's actions to go unnoticed.   More

Security & Privacy Techonomy Events

Bret Hartman of RSA on Cyber Defense

In this video from Techonomy 2011 in Tucson, Ariz., Bret Hartman, CTO of RSA, talks about lessons his company learned when they faced a major cyber attack in early 2011. Hartman addresses the technological, legal, and political barriers to protecting our security, and discusses the severity of intellectual property theft as a global problem.   More